Role-Based Access Control Models
Computer
Design and implementation of a flexible RBAC-service in an object-oriented scripting language
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Induced role hierarchies with attribute-based RBAC
Proceedings of the eighth ACM symposium on Access control models and technologies
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
KAoS Policy Management for Semantic Web Services
IEEE Intelligent Systems
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Using Semantic Web Technologies to Specify Constraints of RBAC
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
Bringing Relational Data into the SemanticWeb using SPARQL and Relational.OWL
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
Self-Describing Delegation Networks for the Web
POLICY '06 Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Using semantic web technologies for policy management on the web
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
Representing transitive propagation in OWL
ER'06 Proceedings of the 25th international conference on Conceptual Modeling
Integrating and exchanging XML data using ontologies
Journal on Data Semantics VI
A location aware role and attribute based access control system
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
An architecture for specification and enforcement of temporal access control constraints using OWL
Proceedings of the 2009 ACM workshop on Secure web services
Scalable and efficient reasoning for enforcing role-based access control
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Prox-RBAC: a proximity-based spatially aware RBAC
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Cloud-Centric assured information sharing
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
RABAC: role-centric attribute-based access control
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Implementing an enterprise business context model for defining mobile broadband policy
Proceedings of the 8th International Conference on Network and Service Management
Hi-index | 0.00 |
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attributes. Our approach provides for the dynamic association of roles with users. A Description Logic (DL) reasoner is used to classify both users and resources, and verify the consistency of the access control policies. We mitigate the limited expressive power of the DL formalism by refining the output of the DL reasoner with SPARQL queries. Finally, we provide a proof-of-concept implementation of the system written in Java.™